Redefining the Approach to Cybersecurity
Identifieur interne : 000220 ( 2020/Analysis ); précédent : 000219; suivant : 000221Redefining the Approach to Cybersecurity
Auteurs : Isabella Corradini [Italie]Source :
- Building a Cybersecurity Culture in Organizations ; 2020.
Abstract
One of the most critical issues in cybersecurity is represented by social engineering attacks. These threats have been known for years, but it is very difficult to handle them effectively, because they are strictly related to human nature. Social engineering is not just a phishing email; indeed, it is possible to distinguish several forms of attack which combine different elements, from human to social to physical and technological. According to a psychological point of view, social engineering is a powerful means of gaining information exploiting individuals’ weaknesses. Moreover, due to the mechanisms of persuasion, widely studied in literature, it is easy to imagine how complicated the management of this threat is. Appropriate training of employees, especially of key roles of the company, can be an effective antidote to social engineering. Given the current scenario and the future perspective in cybersecurity, it is clear that the approach used to manage cybersecurity requires a radical change. Currently, the preferred cybersecurity strategy is still based on technological solutions, without brilliant results, since cyberthreats keep growing. Many are convinced that Artificial Intelligence (AI) will be an opportunity for managing cybersecurity; whether true or not, it is however evident that AI has also the power to generate new threats and to strengthen the existing ones. Therefore, we should be very prudent when technologies are presented as a miracle solution for cybersecurity problems. The starting point is that technology has to be deployed under full human control. Then, critical thinking is needed to develop alternatives to improve the current approach to cybersecurity. In short, we need to develop a multidisciplinary vision of cybersecurity, involving other disciplines and assuming different perspectives.
Url:
DOI: 10.1007/978-3-030-43999-6_3
PubMed: NONE
PubMed Central: 7189027
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Pmc, to step Corpus: 000024
- to stream Pmc, to step Curation: 000024
- to stream Pmc, to step Checkpoint: 000178
- to stream Ncbi, to step Merge: 001414
- to stream Ncbi, to step Curation: 001414
- to stream Ncbi, to step Checkpoint: 001414
- to stream Main, to step Merge: 000220
- to stream Main, to step Curation: 000220
- to stream Main, to step Exploration: 000220
- to stream 2020, to step Extraction: 000220
Links to Exploration step
PMC:7189027Le document en format XML
<record><TEI><teiHeader><fileDesc><titleStmt><title xml:lang="en">Redefining the Approach to Cybersecurity</title>
<author><name sortKey="Corradini, Isabella" sort="Corradini, Isabella" uniqKey="Corradini I" first="Isabella" last="Corradini">Isabella Corradini</name>
<affiliation wicri:level="3"><nlm:aff id="Aff3">Themis Research Center, Rome, Italy</nlm:aff>
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Themis Research Center, Rome</wicri:regionArea>
<placeName><settlement type="city">Rome</settlement>
<region nuts="2">Latium</region>
</placeName>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">PMC</idno>
<idno type="pmc">7189027</idno>
<idno type="url">http://www.ncbi.nlm.nih.gov/pmc/articles/PMC7189027</idno>
<idno type="RBID">PMC:7189027</idno>
<idno type="doi">10.1007/978-3-030-43999-6_3</idno>
<idno type="pmid">NONE</idno>
<date when="2020">2020</date>
<idno type="wicri:Area/Pmc/Corpus">000024</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Corpus" wicri:corpus="PMC">000024</idno>
<idno type="wicri:Area/Pmc/Curation">000024</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Curation">000024</idno>
<idno type="wicri:Area/Pmc/Checkpoint">000178</idno>
<idno type="wicri:explorRef" wicri:stream="Pmc" wicri:step="Checkpoint">000178</idno>
<idno type="wicri:Area/Ncbi/Merge">001414</idno>
<idno type="wicri:Area/Ncbi/Curation">001414</idno>
<idno type="wicri:Area/Ncbi/Checkpoint">001414</idno>
<idno type="wicri:Area/Main/Merge">000220</idno>
<idno type="wicri:Area/Main/Curation">000220</idno>
<idno type="wicri:Area/Main/Exploration">000220</idno>
<idno type="wicri:Area/2020/Extraction">000220</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title xml:lang="en" level="a" type="main">Redefining the Approach to Cybersecurity</title>
<author><name sortKey="Corradini, Isabella" sort="Corradini, Isabella" uniqKey="Corradini I" first="Isabella" last="Corradini">Isabella Corradini</name>
<affiliation wicri:level="3"><nlm:aff id="Aff3">Themis Research Center, Rome, Italy</nlm:aff>
<country xml:lang="fr">Italie</country>
<wicri:regionArea>Themis Research Center, Rome</wicri:regionArea>
<placeName><settlement type="city">Rome</settlement>
<region nuts="2">Latium</region>
</placeName>
</affiliation>
</author>
</analytic>
<series><title level="j">Building a Cybersecurity Culture in Organizations</title>
<imprint><date when="2020">2020</date>
</imprint>
</series>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc><textClass></textClass>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en"><p id="Par1">One of the most critical issues in cybersecurity is represented by social engineering attacks. These threats have been known for years, but it is very difficult to handle them effectively, because they are strictly related to human nature. Social engineering is not just a phishing email; indeed, it is possible to distinguish several forms of attack which combine different elements, from human to social to physical and technological. According to a psychological point of view, social engineering is a powerful means of gaining information exploiting individuals’ weaknesses. Moreover, due to the mechanisms of persuasion, widely studied in literature, it is easy to imagine how complicated the management of this threat is. Appropriate training of employees, especially of key roles of the company, can be an effective antidote to social engineering. Given the current scenario and the future perspective in cybersecurity, it is clear that the approach used to manage cybersecurity requires a radical change. Currently, the preferred cybersecurity strategy is still based on technological solutions, without brilliant results, since cyberthreats keep growing. Many are convinced that Artificial Intelligence (AI) will be an opportunity for managing cybersecurity; whether true or not, it is however evident that AI has also the power to generate new threats and to strengthen the existing ones. Therefore, we should be very prudent when technologies are presented as a miracle solution for cybersecurity problems. The starting point is that technology has to be deployed under full human control. Then, critical thinking is needed to develop alternatives to improve the current approach to cybersecurity. In short, we need to develop a multidisciplinary vision of cybersecurity, involving other disciplines and assuming different perspectives.</p>
</div>
</front>
<back><div1 type="bibliography"><listBibl><biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct><analytic><author><name sortKey="Cialdini, Rb" uniqKey="Cialdini R">RB Cialdini</name>
</author>
</analytic>
</biblStruct>
<biblStruct><analytic><author><name sortKey="Cybenko, G" uniqKey="Cybenko G">G Cybenko</name>
</author>
<author><name sortKey="Giani, A" uniqKey="Giani A">A Giani</name>
</author>
<author><name sortKey="Thompson, P" uniqKey="Thompson P">P Thompson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct><analytic><author><name sortKey="Krombholz, K" uniqKey="Krombholz K">K Krombholz</name>
</author>
<author><name sortKey="Hobel, H" uniqKey="Hobel H">H Hobel</name>
</author>
<author><name sortKey="Huber, M" uniqKey="Huber M">M Huber</name>
</author>
<author><name sortKey="Weippl, E" uniqKey="Weippl E">E Weippl</name>
</author>
</analytic>
</biblStruct>
<biblStruct><analytic><author><name sortKey="Kruglanski, Aw" uniqKey="Kruglanski A">AW Kruglanski</name>
</author>
<author><name sortKey="Thomson, Ep" uniqKey="Thomson E">EP Thomson</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct><analytic><author><name sortKey="Mitnick, Kd" uniqKey="Mitnick K">KD Mitnick</name>
</author>
<author><name sortKey="Simon, Wl" uniqKey="Simon W">WL Simon</name>
</author>
</analytic>
</biblStruct>
<biblStruct><analytic><author><name sortKey="Mouton, F" uniqKey="Mouton F">F Mouton</name>
</author>
<author><name sortKey="Leenen, L" uniqKey="Leenen L">L Leenen</name>
</author>
<author><name sortKey="Venter, Hs" uniqKey="Venter H">HS Venter</name>
</author>
</analytic>
</biblStruct>
<biblStruct><analytic><author><name sortKey="Mulligan, Dk" uniqKey="Mulligan D">DK Mulligan</name>
</author>
<author><name sortKey="Schneider, Fb" uniqKey="Schneider F">FB Schneider</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct><analytic><author><name sortKey="Taddeo, M" uniqKey="Taddeo M">M Taddeo</name>
</author>
</analytic>
</biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct></biblStruct>
<biblStruct><analytic><author><name sortKey="Xiang, Y" uniqKey="Xiang Y">Y Xiang</name>
</author>
<author><name sortKey="Wang, L" uniqKey="Wang L">L Wang</name>
</author>
<author><name sortKey="Liu, N" uniqKey="Liu N">N Liu</name>
</author>
</analytic>
</biblStruct>
<biblStruct><analytic><author><name sortKey="Zimmermann, V" uniqKey="Zimmermann V">V Zimmermann</name>
</author>
<author><name sortKey="Renaud, K" uniqKey="Renaud K">K Renaud</name>
</author>
</analytic>
</biblStruct>
</listBibl>
</div1>
</back>
</TEI>
<affiliations><list><country><li>Italie</li>
</country>
<region><li>Latium</li>
</region>
<settlement><li>Rome</li>
</settlement>
</list>
<tree><country name="Italie"><region name="Latium"><name sortKey="Corradini, Isabella" sort="Corradini, Isabella" uniqKey="Corradini I" first="Isabella" last="Corradini">Isabella Corradini</name>
</region>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Sante/explor/StressCovidV1/Data/2020/Analysis
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000220 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/2020/Analysis/biblio.hfd -nk 000220 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Sante |area= StressCovidV1 |flux= 2020 |étape= Analysis |type= RBID |clé= PMC:7189027 |texte= Redefining the Approach to Cybersecurity }}
Pour générer des pages wiki
HfdIndexSelect -h $EXPLOR_AREA/Data/2020/Analysis/RBID.i -Sk "pubmed:NONE" \ | HfdSelect -Kh $EXPLOR_AREA/Data/2020/Analysis/biblio.hfd \ | NlmPubMed2Wicri -a StressCovidV1
This area was generated with Dilib version V0.6.33. |